APPARATUS, SYSTEM, AND METHOD OF DATA ARRAY TRANSFORMATION

    公开(公告)号:US20240338150A1

    公开(公告)日:2024-10-10

    申请号:US18608688

    申请日:2024-03-18

    发明人: Merav Sicron

    IPC分类号: G06F3/06 G01S13/931

    摘要: For example, a Data Mover and Transformer (DMT) may be configured to transform a first data array from a first memory into a second data array to be stored in a second memory. The DMT may include a Row to Column (R2C) transformer configured to transform a data sub-array into a transformed data sub-array by transforming one or more rows of the data sub-array into one or more respective columns of the transformed data sub-array; a memory reader to populate the data sub-array with data retrieved from the first memory according to a memory read pattern, wherein the memory read pattern is based on a predefined transformation from the first data array to the second data array; and a memory writer to write data from the transformed data sub-array to the second memory according to a memory write pattern, wherein the memory write pattern is based on the predefined transformation.

    SECURE COMMUNICATION BETWEEN A SOURCE TO MULTIPLE TARGETS

    公开(公告)号:US20240275616A1

    公开(公告)日:2024-08-15

    申请号:US18442763

    申请日:2024-02-15

    IPC分类号: H04L9/32 H04L9/08

    摘要: A method for secure communication, the method includes (a) receiving, by a first entity executable by a first circuit, challenges of second entities, the second entities are executable by second circuits; (b) generating a pair of asymmetrical keys, the pair includes a new public key and a new private key; (c) generating a response message that includes a representation of the challenges of the second entities and the new public key, wherein the response message is signed by the first entity; (d) sending the response message to the second entities; (e) for each second entity (e.1) determining a unique symmetrical key associated with the second entity; wherein the determining is based on the new private key and a verified public key of the second entity; and (e.2) securely communicating with the second entity using the unique symmetrical key associated with the second entity.

    FINETUNING FOR MULTI-TASK LEARNING
    5.
    发明公开

    公开(公告)号:US20240256860A1

    公开(公告)日:2024-08-01

    申请号:US18424024

    申请日:2024-01-26

    IPC分类号: G06N3/08

    CPC分类号: G06N3/08

    摘要: Systems and methods generate an extended trained model. In one implementation, a method includes obtaining a preexisting trained model, the preexisting trained model including a plurality of preexisting weights, wherein each of the plurality of preexisting weights is associated with a preexisting value; identifying a subset of the plurality of preexisting weights; generating a plurality of extended weights based on a training process using duplicates of the subset of the plurality of preexisting weights; and generating the extended trained model, wherein the extended trained model includes the plurality of preexisting weights and the plurality of extended weights.

    Display screen with animated graphical user interface

    公开(公告)号:USD1035722S1

    公开(公告)日:2024-07-16

    申请号:US29877537

    申请日:2023-06-08

    摘要: FIG. 1 is a front view of a first image in a sequence of a display screen with animated graphical user interface, showing the new design;
    FIG. 2 is a second image thereof;
    FIG. 3 is a third image thereof;
    FIG. 4 is a fourth image thereof; and,
    FIG. 5 is a fifth image thereof.
    The appearance of the transitional image sequentially transitions between the images shown in FIGS. 1-5. The process or period in which the images transition forms no part of the claimed design.
    The broken lines of uneven length show the display screen and form no part of the claimed design.

    Anonymous collection of data from a group of entitled members

    公开(公告)号:US11888826B2

    公开(公告)日:2024-01-30

    申请号:US17878363

    申请日:2022-08-01

    发明人: Aviad Kipnis

    IPC分类号: H04L9/40 H04L9/08 H04L9/32

    摘要: A method for collecting data from a group of entitled members. The method may include receiving, by a collection unit, a message and a message signature; validating, by the collection unit, whether the message was received from any of the entitled members of the group, without identifying the entitled member that sent the message; wherein the validating comprises applying a second plurality of mathematical operations on a first group of secrets, a second group of secrets, and a first part of the message signature; and rejecting, by the collection unit, the message when validating that the message was not received from any entitled member of the group.